Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Measuring the emergence of consent management on the web
Privacy laws like the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …
Mental model-based designs: the study in privacy policy landscape
Users' mental models influence secure and privacy-preserving behavior in a computing
environment. Prior studies on users' mental models of Internet, security tools, and digital …
environment. Prior studies on users' mental models of Internet, security tools, and digital …
The polarizing content warning: how the media can reduce affective polarization
Past research suggests that journalists can (unintentionally) exacerbate affective
polarization when reporting on growing levels of polarization in society. However, is there a …
polarization when reporting on growing levels of polarization in society. However, is there a …
Misinformation warnings: Twitter's soft moderation effects on COVID-19 vaccine belief echoes
F Sharevski, R Alsaadi, P Jachim, E Pieroni - Computers & security, 2022 - Elsevier
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
[HTML][HTML] (Mis) perceptions and engagement on Twitter: COVID-19 vaccine rumors on efficacy and mass immunization effort
F Sharevski, A Huff, P Jachim, E Pieroni - International Journal of …, 2022 - Elsevier
This paper reports the findings of a 606-participant study analyzing the perception of, and
engagement with, COVID-19 vaccine rumors on efficacy and mass immunization effort on …
engagement with, COVID-19 vaccine rumors on efficacy and mass immunization effort on …
Phishing with malicious QR codes
F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …
That changed overnight, as the QR codes became a convenient go-between for sharing …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Assessing Suspicious Emails with Banner Warnings Among Blind and {Low-Vision} Users in Realistic Settings
Warning users about suspicious emails usually happens through visual interventions such
as banners. Evidence from laboratory experiments shows that email banner warnings are …
as banners. Evidence from laboratory experiments shows that email banner warnings are …
Meaningful context, a red flag, or both? preferences for enhanced misinformation warnings among us twitter users
F Sharevski, A Devine, P Jachim, E Pieroni - Proceedings of the 2022 …, 2022 - dl.acm.org
Warning users about misinformation on social media is not a simple usability task. Soft
moderation has to balance between debunking falsehoods and avoiding moderation bias …
moderation has to balance between debunking falsehoods and avoiding moderation bias …
“Taking out the trash”: Why security behavior change requires intentional forgetting
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …
provides some form of awareness or training, mostly bought from external vendors …